Digital Security Within the Workplace

Extracts from this document...

Introduction

Digital security within the workplace If you don't want anyone to hack into your computer you are better off being protected by adding a password to protect your files. Files can easily be accessed by anyone and this could lead to your files getting deleted, important files can get hacked into and may result in you not accessing them again. Security is really important this doesn't matter were it could be at home or work, your computer or laptop should always be protected. Data misuse and unauthorised transfer or copying Data misuse falls into the category of accessing someone else's computer System with intentions to commit an offence such as stealing data, without their permission. Unauthorized copying occurs when the exclusive right to reproduce protected work is violated, which is generally when a copy is made from a protected file of work without the copyright owner's permission. The computer Misuse Act doesn't allow somebody else to access a computer by using someone else's identification. Other things include changing, copying, deleting or moving a programme. You cannot also run a program or obtain any data even though it's not for personal gain. Hacking to someone else's account through their password is also listed in the Computer Misuse Act. ...read more.

Middle

To prevent this form happening you shouldn't tell anyone were you live because they might end up stalking you unless you know the person then it's different, you shouldn't meet up with them this could lead to kidnapping and finally you could install a blocker which will block unsafe chat room sites. Virus protection A virus is really harmful it could lead to you loosing important files and folders which you can't retrieve back and can also destroy your hard drive. A virus may be transmitted on disks and through networks, on-line services, and also through the Internet. The ways that a virus could do this is through an email which is the most common way. When you open an email from an unrecognized sender and has an attachment with it you shouldn't open it because theirs a high risk of a virus getting attached to the file. By having a good anti virus protection on the computer, your computer will always be protected from viruses attacking your computer which is a helpful way to ensure there are no viruses on the computer. Viruses appear in many forms such as pop up boxes which then you block through your settings by clicking on block all pop ups. ...read more.

Conclusion

* Install programs such as firewall keep hackers and viruses out of the computer system * Put passwords on documents and it should contain numbers and letters so it is hard to hack into your network * Make sure passwords are unique and should change them every 90 days or so * Not open emails from unknown senders * Anti-Virus protection programs will help prevent a hacker from sending viruses etc. * Make sure computers are updated regularly, if they' not then there is a risk which could lead to viruses and computer hacking People always attempt to hack into your computer system; some of the things they do are trying and hack into your computer to collect information. The simple is to just password protect your file by listening to the advice at the top. People also try and use your internet connection to download files, if you are not using your internet connection then you should just switch it of by disconnecting it. This way no one will be able to hack into it. Pornography Is in appropriate to watch or go on pornography in the workplace, as it cab be tracked down by the administrator and also could lead to viruses and then a loss of work can occur. So during the workplace you shouldn't access such content. These are some of the websites I used to get my information: * http://www.bbc.co.uk/schools/gcsebitesize/ict/legal/1dataandcomputermisuserev1.shtml * http://www.detroiteronline.com/index.php?option=com_content&view=article&id=799%3f * http://legal-dictionary.thefreedictionary.com/Unauthorized+copying ...read more.

The above preview is unformatted text

This student written piece of work is one of many that can be found in our GCSE Communications section.

Found what you're looking for?

Start learning 29% faster today

150,000+ documents available

Just £6.99 a month

or

Here's what a star student thought of this essay

3 star(s)

Response to the question

In summary, the report is an 'Pass'. There is a clear basic understanding of a number of security issues when using the computer and internet. However some of these are quite vague and the student may need to research a ...

Response to the question

In summary, the report is an 'Pass'. There is a clear basic understanding of a number of security issues when using the computer and internet. However some of these are quite vague and the student may need to research a little more, to add further detail to the report. The student doesn't understand the term 'hack' and this is used in a number of area's incorrectly. Hacking is an important aspect of security, and this is important to be used correctly within the report. The report needs to be accurate, otherwise this isn't valid and won't achieve high marks. The report does show a detailed screenshot and annotations explaining how a user is able to prevent access to files by setting up a password. In addition the report goes further, and explains and 'Do's' and 'Don't's of choosing a reasonable password to use.

Level of analysis

The section 'Email and abuse in the chat room' describes how someone could be abused using these websites and a number of disadvantages to the user. This answer is developed, as this describes the potential dangers to the person if the person where to access such a website. The section 'Virus Protection' is quite weak in terms of detail. There clearly showing a basic understanding, however the student could give more examples of the types of virus people may suffer with and how this could be transmitted to the user. The section 'Hacking' does lack understanding. The section should be re-written after the student has research what the term is and how to prevent this. At this stage this isn't correct.

Quality of writing

The opening sentence is false, as the report states 'If you donÃ¢â‚¬â„¢t want anyone to hack into your computer you are better off being protected by adding a password to protect your files.'. However this should be something on the lines of 'It's important to add a password to prevent unlawful access to a number of important files'. The term 'hack' is not defined and this is used in the wrong context.

Related GCSE Communications essays

The purpose of the spread sheet model is to provide the user with an action plan on what they need to do, to become healthier and more active. On the final version of the model it was recommended I use more than one colour as I used different shades of

You can easily send files and images. Disadvantages include that the e-mail isn't personal. People can attach viruses which can be downloaded without knowing. To use e-mail an internet connection is needed. Junk mail known as SPAM is a big problem but can be controlled using special settings with things like AOL mail controls.

on a particular technology that is specialized and is intended to meet the needs of individuals facing disabilities and so is called specialized i.e. speech synthesizer. Maria Korelli uses a number of technologies alongside with wheelchair in her daily life.

It's good to have a technology like the Digital Ultra Cane it meets Mary needs as she doesn't know about her area a lot so the digital Ultra Cane acts like assistance so it helps her to walk safely and quicker.

Of course using text messaging to hold a two way conversation is really time consuming and in these cases a phone call is much more suitable. Other Members of My family: Other members in my family use the same ICT technologies as I do, such as the internet.

Technolog3: A USB flash drive is essentially a NAND-type flash memory included with a USB 1.1 or 2.0 interface. It is used as a small, lightweight, removable data storage device of up to 16 GB, but can also range from smaller memories.